A software implementation of an Internet Security Access Control Scheme (ISACS) through TCP/IP protocols

Bibliographic Details
Main Author: Ertaul, Levent
Published: University of Sussex 1994
Subjects:
005
Online Access:http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.358878
id ndltd-bl.uk-oai-ethos.bl.uk-358878
record_format oai_dc
spelling ndltd-bl.uk-oai-ethos.bl.uk-3588782015-03-19T04:53:19ZA software implementation of an Internet Security Access Control Scheme (ISACS) through TCP/IP protocolsErtaul, Levent1994005Computer securityUniversity of Sussexhttp://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.358878Electronic Thesis or Dissertation
collection NDLTD
sources NDLTD
topic 005
Computer security
spellingShingle 005
Computer security
Ertaul, Levent
A software implementation of an Internet Security Access Control Scheme (ISACS) through TCP/IP protocols
author Ertaul, Levent
author_facet Ertaul, Levent
author_sort Ertaul, Levent
title A software implementation of an Internet Security Access Control Scheme (ISACS) through TCP/IP protocols
title_short A software implementation of an Internet Security Access Control Scheme (ISACS) through TCP/IP protocols
title_full A software implementation of an Internet Security Access Control Scheme (ISACS) through TCP/IP protocols
title_fullStr A software implementation of an Internet Security Access Control Scheme (ISACS) through TCP/IP protocols
title_full_unstemmed A software implementation of an Internet Security Access Control Scheme (ISACS) through TCP/IP protocols
title_sort software implementation of an internet security access control scheme (isacs) through tcp/ip protocols
publisher University of Sussex
publishDate 1994
url http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.358878
work_keys_str_mv AT ertaullevent asoftwareimplementationofaninternetsecurityaccesscontrolschemeisacsthroughtcpipprotocols
AT ertaullevent softwareimplementationofaninternetsecurityaccesscontrolschemeisacsthroughtcpipprotocols
_version_ 1716738952282505216